General

  • Target

    328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe

  • Size

    951KB

  • Sample

    240623-drtxss1gln

  • MD5

    d84d530414c37f30600c1ccce1ab3d40

  • SHA1

    9523d04d1a1d01c8312dd6e4dc16e77ae2a87e0a

  • SHA256

    328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5

  • SHA512

    4f6eb9f2150eb5d701c4db23a9e539a68f74d5c98e49718603c9a5f72a850f139595e35363378a48cb0cdb2a447ba65cce0bd02b922d12c5fc2cf55835d7beff

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe

    • Size

      951KB

    • MD5

      d84d530414c37f30600c1ccce1ab3d40

    • SHA1

      9523d04d1a1d01c8312dd6e4dc16e77ae2a87e0a

    • SHA256

      328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5

    • SHA512

      4f6eb9f2150eb5d701c4db23a9e539a68f74d5c98e49718603c9a5f72a850f139595e35363378a48cb0cdb2a447ba65cce0bd02b922d12c5fc2cf55835d7beff

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks